41. A ………
computer is a large and expensive computer capable of simultaneously processing
data for hundreds or thousands of users.(A) server(B) mainframe(C) desktop(D) tablet(E) None of these

42. The trend in computer systems
is toward the use of graphical user interfaces (GUIs). In these operating
systems, a trackball is described as—(A) a roller ball which moves the
cursor(B) a pen-shaped device which
allows data to be entered through the CRT screen(C) a figure which resembles a
familiar office device(D) an outdated input device(E) None of these

43. Various applications and
documents are represented on the Windows desktop by—(A) Symbols(B) Labels(C) Graphs(D) Icons(E) None of these

44. What is usually used for
displaying information at public places ?(A) Monitors(B) Overhead Projections(C) Monitors and Overhead
Projections(D) Touch Screen Kiosks(E) None of these

45. The real business and
competitive value of information technology lies in—(A) The software applications
that are used by many companies(B) The capabilities of the
software and value of the information a business acquires and uses(C) The infrastructure of
hardware, networks, and other IT facilities that are commonly used by many
companies(D) The capabilities of the
hardware and the speed at which it processes information(E) None of these

46. Companies use which of the
following vendors to provide access to software and services rather than
purchasing the applications and maintaining the applications themselves ?(A) Open source vendors(B) Alliances(C) Application service providers(D) All of the above(E) None of these

47. Which one of the following
would be considered as a way that a computer virus can enter a computer system
?(A) Opening an application
previously installed on the computer(B) Borrowed copies of software(C) Viewing a website without
causing any additional transactions(D) Running anti virus programs(E) None of these

48. Collecting personal
information and effectively posing as another individual is known as the crime
of—(A) spooling(B) Identity theft(C) spoofing(D) hacking(E) None of these

49. The first step in the
transaction processing cycle is—(A) database operations(B) audit(C) data entry(D) user inquiry(E) None of these

50. In the information systems
concept, the output function involves—(A) Capturing and assembling
elements that enter the system to be processed(B) Transformation processes that
convert input into output(C) Transferring elements that
have been produced by a transformation process to their ultimate destination(D) Monitoring and evaluating
feedback to determine whether a system is moving toward the achievement of its
goal(E) None of these
*****************